Search Results

Steve Durbin, managing director of the Information Security Forum, calls on organisations to set up cyber-resilience teams

Every year, we spend more money and time combatting the dark forces of cyber space: state-sponsored operatives, organised crime rings and super-hackers armed with black-ops tech. The attack methods mutate constantly, growing more cancerous and damaging. Massive data breaches and their ripple effects compel organisations of every kind to grapple with risk and security at a more fundamental level.

The harm done to brand reputation can be long lasting and hard to control. Breached companies are liable for significant restitution to customers and suppliers, face closer scrutiny and higher fines from regulators, and often struggle with a sudden drop in sales or loss of business.

The appearance of negligence, repeat attacks or unpredictable fallout from a breach can significantly unravel public goodwill that took decades to build. The trust dynamic that exists among suppliers, customers and partners is a high-profile target for cyber criminals and hacktivists.

The attack on US retailer Target is a fascinating example of the myriad ways a breach can turn nasty for even the most established brand with repercussions from the boardroom to the technology department, marketing and beyond.

Take It to the Board

Information risk must be elevated to a board-level issue and given the same attention afforded to other risk management practices. Organisations face a daunting array of challenges interconnected with cyber security: the insatiable appetite for speed and agility, the growing dependence on complex supply chains, and the rapid emergence of new technologies. Cyber security chiefs must drive collaboration across the entire enterprise, bringing business and marketing needs into alignment with IT strategy. IT must transform the security conversation so it will resonate with leading decision-makers while also supporting the organisation’s business objectives.

Cyber Resilience is Crucial

Every organisation must assume they will eventually incur severe impacts from unpredictable cyber threats. Planning for resilient incident response in the aftermath of a breach is imperative. Traditional risk management is insufficient. It’s important to learn from the cautionary tales of past breaches, not only to build better defences, but also better responses.

Business, government and personal security are now so interconnected, resilience is important to withstanding direct attacks as well as the ripple effects that pass through interdependent systems.

I strongly urge organisations to establish a crisis management plan that includes the formation of a cyber-resilience team. This team, made up of experienced security professionals, should be charged with thoroughly investigating each incident and ensuring that all relevant players communicate effectively. This is the only way a comprehensive and collaborative recovery plan can be implemented in a timely fashion.

Today’s most cyber-resilient organisations are appointing a co-ordinator – for example, a director of cyber security or a chief digital officer – to oversee security operations and to apprise the board of its related responsibilities.

The new legal aspects of doing business in cyberspace put more pressure on the board and C-suite. For example, an enterprise that cannot prove compliance with regulations, such as the upcoming EU’s General Data Protection Regulation, could incur significant damages even in the event of a breach or face more severe penalties after a successful attack.

Key Steps

We no longer hide behind impenetrable walls, but operate as part of an interconnected whole. The strength to absorb the blows and forge ahead is essential to competitive advantage and growth, in cyberspace and beyond.

Here is a quick recap of the next steps that businesses should implement to prepare themselves:

  • Reassess the risks to your organisation and its information from the inside out. Operate on the assumption that your organisation is a target and will be breached.
  • Revise cyber-security arrangements: implement a cyber-resilience team and rehearse your recovery plan.
  • Focus on the basics: people and technology.
  • Prepare for the future: to minimise risk and brand damage, be proactive about security in every business initiative.

This article was written by Raconteur from Raconteur and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to legal@newscred.com.

Cyber security is a key concern for organisations of all sizes. Protecting devices, networks, data and apps is an essential component of doing business. Vodafone provides security products and services to businesses of all sizes, helping you secure your business anywhere because we are everywhere. We are trusted by organisations globally, including utilities, financial institutions and government agencies. For more cyber security insights, you can find us on Twitter and LinkedIn.

main_icn_24_7_support24-delivery 360-view4gmain_icn_Accessoriesmain_icn_Appsapple market_icn_Batterybroadband-devicecalendarmarket_icn_Minutesmain_icn_Cameramain_icn_Chatmain_icn_Chevron_downmain_icn_Chevron_leftmain_icn_Chevron_rightmain_icn_Chevron_upmain_icn_Tick_simpleClose_thick_0.1main_icn_Closecommunity-thin main_icn_Community_or_Foundationdashboard-hidashboard-thin main_icn_Dashboardmarket_icn_Data_Sharingmarket_icn_Dealsmain_icn_Deletemain_icn_Deliverymain_icn_Dislikemain_icn_Downloadmain_icn_Editerror-circlefacebook-thin main_icn_Social_Facebookmain_icn_Filtermain_icn_Filtergogoogle-plus-thin social-google-plushelp-hi_1helpmain_icn_Likemarket_icn_LinkedInlocation-hilocation-regular location-thin main_icn_Locationmail-newmarket_icn_Screen_sizemain_icn_Menumarket_icn_SMSmobile-broadbandmain_icn_Mobilemain_icn_My_Vodafonenetwork-signal-hinetwork-thin main_icn_Network_signalmain_icn_Pausemain_icn_PAYGsocial-paypalmain_icn_Photospin_alertpin_manpin_warningplay-circle main_icn_Play_circlemain_icn_Play_arrowmain_icn_Add_or_Plus0_rating5_ratingrating-filled ratingmain_icn_Ratingsrefresh main_icn_Bill_or_Reportmain_icn_Reportsmain_icn_Roamingmain_icn_Searchmain_icn_Securityshareshoppingmarket_icn_SIM_Swapmain_icn_Social_Twitterspeech-bubble main_icn_Studenttail [Converted]technology test_app main_icn_Texttick-bordered tick-simple main_icn_Tick_simplemain_icn_Top_upmain_icn_TVtwitter-thin main_icn_Social_Twitterusersmain_icn_Viewedmarket_icn_Vodafone_storeWarning_0.1warningweightwindow market_icn_Multinationalyoutube-thin social-youtube